Improve your security posture
With Threat Intelligence’s blog you stay up to date with the latest cyber security tips and news

A critical vulnerability (CVSS score of 10 out of 10) is actively being exploited in the wild to execute ransomware or cryptocurrency miners across a large number of Java-based applications and products. Applications or products that use Java quite often use the Log4j library to create log entries. The vulnerability exists in any HTTP header or parameter that is logged via the Log4j library, which allows a remote attacker to perform Remote Code Execution on the underlying server. This is achieved by forcing the server to download a remotely hosted Java Class that it then executes. The vulnerability identifier for this vulnerability is CVE-2021-44228 and is dubbed the "Log4Shell" vulnerability.

It is undeniable that organizations require robust security measures against cyber threats. A cyber-breach can result in huge expenses to your organization. So what can we do to help prevent these breaches? This is the purpose of a strong security architecture that can reduce these cyber security threats and the expenses that might result from them. A security architecture is a set of models, methods, and security principles that align with your objectives, keeping your organization safe from cyber threats. Through security architecture, a business’ requirements are translated to executable security requirements. Just like architecture in construction where there is an examination of the property in such factors as climate, soil type, topography, and client preference, so must a security architect understand the network, firewalls, defences, detection systems, and many other factors.

As the cyberthreat landscape evolves at a dizzying speed, the only way organizations can stay ahead of threat actors is by prioritizing their cybersecurity programs. They must also monitor and analyze their security posture on an ongoing basis to detect, prevent and respond to threats. Here’s where a Security Operations Center (SOC) plays a vital role. SOC teams use numerous processes and tools to detect, analyze, respond to and investigate anomalous behaviour and cybersecurity incidents. But even knowing how important the SOC is, not all organizations can set up the team in-house; they may lack the resources, skills, budget . . . there are any number of reasons why this happens. Fortunately, they can still leverage all the benefits of a SOC – with a managed SOC (or SOC as a Service).